1 Introduction

The individual identification based on the iris is one of the most important biometrics due to its unique and apparently stable iris patterns. The noise artifacts such as eyelashes/eyelids occlusion, specular reflections, blurring, non-circular iris boundaries, off-axis gaze, etc., make the segmentation more difficult. The segmentation algorithms can be classified broadly into two groups. Segmentation of perfect (ideal) iris images and segmentation of degraded (non-ideal) iris images. For the segmentation of ideal iris images, numerous techniques have been suggested by many researchers in the literature [1,2,3,4,5,6,7,8,9]. Segmentation of degraded iris images has grabbed attention for a decade. Even though numerous approaches have been suggested for the segmentation of non-ideal iris image [10,11,12,13,14,15,16,17,18] there is still room for improvement in robustness and efficiency.

A wide range of segmentation approaches can be found in the literature, which include level set model [15], active contours [16], clustering [19, 20], watershed transform [21], graph cut [22], region growing [23], deep learning [24], etc. Among these varieties, clustering is employed for segmentation due to its rapidity and effectiveness. The purpose of clustering is to group the pixels of an image into various subgroups, based on pixel intensities, which are called clusters. Pixel intensities that belong to the same subgroup are as similar as possible to each other, whereas adjacent groups share the maximum difference. One popular clustering algorithm used widely to solve the segmentation problem is the Fuzzy c-means (FCM) algorithm. It is a soft clustering method, which allows image pixel intensities belong to more than one subgroup and thus has a better ability to tolerate disturbance resulting from noisy data [19, 25, 26].

However, the conventional FCM has the following shortfalls: (1) It is essentially a local search optimization algorithm, therefore sensitive to initialize the initial cluster centers [27, 28]. To address this problem, many heuristic approaches have been proposed by many researchers. For instance, a genetic algorithm (GA) based clustering method has been introduced in [29]. Particle swarm optimization based FCM methods have been employed in [30]. The authors in, [31,32,33] proposed an image segmentation algorithm using an improved form of the differential evolution (DE) algorithm based FCM. Recently, authors in [34], proposed a forest optimization algorithm based FCM to obtain optimized cluster centers. (2) FCM is based on gray-level information hence, fails to segment complex textured and noisy images. To address this, authors have been proposed algorithms which use the local spacial information of the image [35,36,37,38]. These techniques are implemented by considering intensity inhomogeneities, employing median and average filtering to obtain spacial neighborhood information and grayscale histograms instead of pixels. However, they do not guarantee noise immunity and preservation of image details. The authors in [39], proposed fast & robust FCM (FRFCM) which employs morphological reconstruction (MR) filters to guarantee both noise immunity and preserving of the image details. Motivated by this idea, in our early work [40], proposed an improved particle swarm optimization based morphological reconstruct fuzzy c-means (IPSO-MRFCM) to segment the degraded iris images in order to improve the segmentation efficiency.

In this work, another efficient method has been presented for the segmentation of iris images in the iris recognition frameworkFootnote 1 (Fig. 1) in order to enhance the efficiency further. Our main contributions to this work are:

  • The proposed method employs an improved differential search algorithm (IDSA) based morphological reconstruction FCM to smooth the image and to highlight the contours of the objects present in an image. The optimization method IDSA is employed to keep away FCM trapped into a local optimum and lead to the global optimum.

  • The isolated iris region is then separated from the unwanted regions by applying geodesic active contours (GACs) incorporated by a modified stopping criterion. Therefore, the proposed method is more robust than the existing methods for non-ideal images.

Fig. 1
figure 1

The block diagram representation of the proposed method

The rest of the paper is organized as follows. Section 2 provides the details of some baseline segmentation methods. The proposed method has been described in Sect. 3. Experimental results are discussed in Sect. 4. Finally, the paper has been concluded in Sect. 5.

2 Baseline methods for iris segmentation

2.1 Integro-Differential Operator

Baseline segmentation methods are first defined, to demonstrate the proposed method performance improvement. A variant of Hough transform, an Integro-differential operator(IDO), has been used by Daugman in [1, 2], which detects a circular boundary in an edge mapped image.

$$\begin{array}{c}max\\ \left(r,{x}_{\mathit{ip}},{y}_{\mathit{ip}}\right)\end{array} \left|\frac{\partial }{\partial r}{G}_{\sigma }\left(r\right)*\oint \frac{I(x,y)}{2\pi r}ds\right|$$
(1)

In Eq. (1), r and (xip,yip) describes the radius and center of the iris or pupil, respectively. I(x,y) is the image to be segmented and \({G}_{\sigma }\left(r\right)\) is a Gaussian filter. The IDO searches iteratively such that the difference in radial image pixel intensity is maximum.

2.2 Geodesic active contour (GAC)

The GAC is a combination of energy functional minimization and geometric model [18, 41]. Initially, the stopping function K of an image to be segmented is determined by using Eq. (5). Here the images to be segmented are pre-segmented images. To avoid the termination of evolving GAC curve due to the edges of the pupil and the local minima formed as a result of thick radial furrows, dark crypts, and specular reflections a modified stopping function \({K}^{{{\prime}}}\)(Eq. (4)) used in [20], has been employed.

A contour with a radius of rp + 5, where rp is the pupil radius, which is initialized as the initial contour near the pupil. The embedding function \(\varphi\) is evolved iteratively according to Eq. (2) until it meets the stopping criterion.

$${\varphi }_{i,j}^{t+1}={\varphi }_{i,j}^{t}+\Delta t\left(-c{K}_{i,j}^{{{\prime}}}\Vert \nabla {\varphi }^{t}\Vert -{K}_{i,j}^{{{\prime}}}\left(\varepsilon {\varphi }_{i,j}^{t}\Vert \nabla {\varphi }^{t}\Vert \right)+\nabla {{\upvarphi }}_{\mathrm{i},\mathrm{j}}^{\mathrm{t}}.\nabla {K}_{i,j}^{{{\prime}}t}\right)$$
(2)
$$\phi =-\frac{{\varphi }_{xx}{\varphi }_{y}^{2}-2{\varphi }_{x}{\varphi }_{y}{\varphi }_{xy}+{\varphi }_{yy}{\varphi }_{x}^{2}}{{\left({\varphi }_{x}^{2}+{\varphi }_{y}^{2}\right)}^\frac{3}{2}}$$
(3)

where ϕ is the curvature computed by considering current level set values, \(\varphi\) is the gradient of the image. For an effective implementation time step \(\Delta t=0.05,\) velocity of evolution \(c=0.65\), and degree of smoothness \(\varepsilon =1\) are chosen, which are suggested by Shah & Ross in [18].

$${K}^{{{\prime}}}=K+{\delta }_{g}^{\left(n\right)}\left(f\right)$$
(4)

where

$$K\left(x,y\right)=\frac{1}{1+{\left(\frac{\Vert \nabla \left(G\left(x,y\right)*I\left(x,y\right)\right)\Vert }{\beta }\right)}^{\alpha }}$$
(5)

and

$$\delta_{g}^{\left( n \right)} \left( f \right) = \delta_{g}^{\left( 1 \right)} \left( {\delta_{g}^{{\left( {n - 1} \right)}} \left( f \right)} \right)$$

with

$$\delta_{g}^{\left( 1 \right)} \left( f \right) = \left( {f \oplus b} \right) \cap g$$

In Eq. (4), \({\delta }_{g}^{\left(n\right)}\left(f\right)\) is the dilation operator, structuring element b of size 3 × 3 is chosen. ‘g’ is the marker image, and the mask image is denoted by f. In Eq. (5), ‘I’ is an image to be segmented, ‘G’ is the Gaussian kernel, α and β are constants.

3 The proposed method

3.1 Morphological reconstruction FCM Algorithm

A fuzzy clustering algorithm is an approach used for grouping the pixels of an image into different subgroups based on their attribute features similarities. Image pixels with the same attributes belong to the same subgroup. Fuzzy C-means (FCM) method is one of the prominent fuzzy clustering algorithms often used in many data segmentation applications [19, 30]. In the proposed MRFCM algorithm similarity measure is determined by using Euclidean distance. The fitness function to be minimized is described as follows.

$${J}_{MRFCM}=\sum_{k=1}^{n}\sum_{i=1}^{c}{u}_{ik}^{q}{\Vert {\stackrel{\sim }{x}}_{k}-{v}_{i}\Vert }^{2}$$
(6)

where, \(\stackrel{\sim }{x}\) is a morphological reconstructed image is defined as follows:

$$\stackrel{\sim }{x}={R}^{OC}\left({f}^{^{\prime}}\right)$$
(7)

where \({R}^{OC}\) denotes morphological opening-closing by reconstruction (Eq. (14)), and \({f}^{^{\prime}}\) is the adaptive histogram equalization of the original image.

In Eq. (6), \({\Vert {\stackrel{\sim }{x}}_{k}-{v}_{i}\Vert }^{2}\) represents the Euclidean distance between kth data and ith cluster center, q is a real number (\(1\le q<\infty\)), \({u}_{ik}\in \left\{{0,1}\right\},\) is the fuzzy membership partition matrix of size c × n, c is the number of clusters \((2\le c<n)\), by updating cluster centers vi (Eq. 8) and membership range uik (Eq. 9) The fitness function expressed in Eq. (6) is optimized for every iteration, where

$${v}_{i}=\frac{\sum_{k=1}^{n}{u}_{ik}^{q}.{\stackrel{\sim }{x}}_{k}}{\sum_{k=1}^{n}{u}_{ik}^{q}}$$
(8)

and

$${u}_{ik}=\frac{1}{\sum_{j=1}^{C}{\left[\frac{\Vert {\stackrel{\sim }{x}}_{k}-{v}_{i}\Vert }{\Vert {\stackrel{\sim }{x}}_{k}-{v}_{j}\Vert }\right]}^{\frac{2}{q-1}}}$$
(9)

Depending on how it differs with the cluster center, a membership value is allotted to a data sample. When the difference is low, a high membership value will be allotted. Iteration process will terminate when the condition \(\Vert {u}_{ik}^{b+1}-{u}_{ik}^{b}\Vert <\epsilon\) is satisfied, where b is the number of iterations.

3.2 Morphological opening-closing by reconstruction

Distribution characteristics of data are sensitive to noise, and hence the FCM is also sensitive to noise [39]. Therefore, results obtained by FCM are not promising for noisy images. This problem is addressed by introducing morphological reconstruction (MR) filters to FCM to optimize the distribution characteristics of data before applying the segmentation using clustering operation. The MR filters are capable of preserving iris boundaries and remove unwanted portions of the image. We employ morphological “opening by reconstruction (OBR)” followed by “closing by reconstruction (CBR)” to smoothen the original image.

The MR filters are basically categorized into two. Dilation reconstruction, which meets the condition \(g\le {f}^{^{\prime}}\), defined by

$${R}_{f}^{\delta }({f}_{m})={\delta }_{\mu }({f}_{m})$$
(10)

and erosion reconstruction, which meets the condition \(g\ge {f}^{^{\prime}}\), defined by

$${R}_{f}^{\varepsilon }\left({f}_{m}\right)={\varepsilon }_{\mu }\left({f}_{m}\right)$$
(11)

where \(\delta\) and \(\varepsilon\) represent dilation and erosion operations, respectively. The combination of Eq. (10) & Eq. (11) give rise to morphological OBR (Eq. (12)) and CBR (Eq. (13)).

$${\gamma }_{\mu }\left({f}_{m}\right)={\delta }_{f}\left({R}_{f}^{\varepsilon }\left({f}_{m}\right)\right)$$
(12)
$${\varphi }_{\mu }\left({f}_{m}\right)={\varepsilon }_{f}\left({R}_{f}^{\delta }\left({f}_{m}\right)\right)$$
(13)

Because morphological OBR followed by CBR, denoted by \({R}^{OC}\), is more suitable to preserve the boundaries, we employ \({R}^{OC}\) to modify the original image which is defined by

$${R}^{OC}\left({f}^{^{\prime}}\right)={\varphi }_{\mu }({\gamma }_{\mu }\left({f}_{m}\right))$$
(14)

where \({f}_{m}\) is the marker image (\({f}_{m}=\varepsilon ({f}^{^{\prime}})\) for OBR and \({f}_{m}=\delta ({f}^{^{\prime}})\) for CBR) and f is the mask image. In this work, the adaptive histogram equalization of the input image is considered as the mask image.

3.3 Improved differential search algorithm (IDSA)

The FCM algorithm is essentially a local search optimization algorithm. To keep away the FCM trapped into a local minimum, a heuristic evolutionary algorithm, the improved variant of the differential search algorithm, has been adopted. Differential search algorithm (DSA) has a better problem-solving ability in global optimization problem [42]. However, its convergence rate is slow in some cases. The convergence rate of the conventional DSA is enhanced in the improved version of the DSA. This is achieved by incorporating the mutation operation of the DE algorithm [43].

In the conventional DSA each individual organisms of a super-organism utilize N*D-dimension parameter vector within the bounds Xmin and Xmax prescribed as follows.

$${X}_{min}=\{{x}_{1,min},{x}_{2,min},\dots {x}_{D,min}\}$$
$${X}_{max}=\{{x}_{1,max},{x}_{2,max},\dots {x}_{D,max}\}$$

Therefore, the position of individual organisms of an artificial-superorganism is initialized randomly using Eq. (15).

$${x}_{j,i,0}={rand}_{i,j}*\left({x}_{j,max}-{x}_{j,min}\right)+{x}_{j,min}$$
(15)

where, randi,j is a arbitrary number distributed uniformly between 0 and 1. Consider \(i=1,\dots N\) and \(j=1,\dots D\) where, N refers to the number of discrete individuals in a super-organism and D signifies the size of the problem.

The next step in DSA is to determine the intermediate stopover vectors, Si,G, in the migration process, which is expressed by a model called Brownian-like random walk. One of the four forms of DE, called DE/rand/1, is used to improve the search mechanism in the improved variant of DSA. The improved variant of DSA is called DS/rand/1. The intermediate stopover site position corresponding to each population individual can be described as follows.

$${s}_{i,G}=F*\left({X}_{r1,G}-{X}_{i,G}\right)+{X}_{r2,G}$$
(16)

where, \({r}_{1}\mathrm{and }{r}_{2}\) are arbitrary integers between \([\mathrm{1,2},\dots ,N]\) and \({r}_{1}\ne {r}_{2}\ne i\). F is the scaling factor controls the size of a change in the location of the individuals of the organisms’ Eq. (17).

$$F=randg\left[2*rand1\right]*\left(rand2-rand3\right)$$
(17)

where, randg is the gamma random number, and rand1, rand2, and rand3 are the random numbers uniformly distributed between [0,1].

The stopover site search process can be calculated by the individual of artificial organisms as described in Eq. (18) below.

$$s_{i,j,G}^{t} = \left\{ {\begin{array}{*{20}l} {s_{i,j,G} } \hfill & {if\; r_{i,j} = 0} \hfill \\ {X_{i,j,G} } \hfill & {if\; r_{i,j} = 1} \hfill \\ \end{array} } \right.$$
(18)

where, \({s}_{i,j,G}^{t}\) denotes the trail vector at the Gth iteration.

The next population (G + 1), between the stopover site and the artificial-organism population is chosen by using the selection operation described below.

$$X_{i,G + 1} = \left\{ {\begin{array}{*{20}l} {s_{i,G} } \hfill & {if\; f\left( {s_{i,G}^{t} } \right) \le f\left( {X_{i,G} } \right)} \hfill \\ {X_{i,G} } \hfill & {if \;f\left( {s_{i,G}^{t} } \right) > f\left( {X_{i,G} } \right)} \hfill \\ \end{array} } \right.$$
(19)

Individuals of the artificial-organisms shift to stopover site, if it is more productive than the origin owned by the artificial-organisms. The artificial-organisms continue its search for the new stopover site from the current position towards the global optimum.

3.4 The proposed method implementation steps

The IDS-MRFCM implementation steps have been given below.

Step 1 Set the IDS and MRFCM parameters including population size (f), problem dimension (number of clusters, D), maximum generation count (Gmax) and initial cluster centers (Table 1).

Table 1 The assigned values for IDS-MRFCM technique

Step 2 Random generation of artificial organisms. Where artificial organisms one position in search space.

$$LEVELS=\left[\begin{array}{c}\begin{array}{c}\begin{array}{c}{x}_{1}^{1}\dots {x}_{d}^{1}\\ {x}_{1}^{2} \dots {x}_{d}^{2}\end{array}\\ \vdots \vdots \vdots \end{array}\\ {x}_{1}^{pop}\dots {x}_{d}^{pop}\end{array}\right]$$
$${x}_{j,i,0}={rand}_{i,j}*\left({x}_{j,max}-{x}_{j,min}\right)+{x}_{j,min}$$

where, d indicates the number of clusters,\({x}_{j,i,0}\) is the value of each individual belonging to the jth cluster center.

Step 3. Compute centroids (vi), partition matrix (membership degree), uik, according to Eq. (8) & (9)

Step 4 The objective value of an individual particle is determined from Eq. (6).

Step 5 Update the cluster centers using the IDS algorithm described in the previous section (Eq. 16).

Step 6 Terminate the iteration process if \(\Vert {u}_{ik}^{b+1}-{u}_{ik}^{b}\Vert <\epsilon\), where b is the number of iterations. Otherwise repeat steps 3–5.

Step 7 Output the optimized JMRFCM.

The implementation flow diagram of IDS-MRFCM has been illustrated in Fig. 2.

Fig. 2
figure 2

Implementation flow diagram of IDS-MRFCM

Figure 3 illustrates the implementation of the proposed IDS-MRFCM on a sample image from MICHE-I (IP5) database. Figure 3a is the input image and Fig. 3b is the corresponding grayscale image. Figure 3c shows the pre-segmented images using conventional FCM, MRFCM and the proposed IDS-MRFCM. Figure 3d indicates the segmented output images as a result of applying GACs (after 490 iterations). It is clearly visible that the proposed segmentation method is successful in isolating the iris from other parts of the input image.

Fig. 3
figure 3

Implementation of IDS-MRFCM on a sample image from MICHE-I (IP5) database. a input image, b gray scale input image, c pre-segmentation using FCM, MRFCM and IDS-MRFCM, respectively, d segmentation using GACs

4 Results and discussion

The performance of the proposed segmentation method is tested by considering real datasets that are available publicly for researchers. The datasets considered for the experimentation has been presented in Table 2. Four datasets named CASIAv3-Interval, UBIRISv1, MMU1, and IITDv1 have been used for the experiments. The proposed technique is also tested on the MICHE-I database, which was used in the competition named Mobile Iris Challenge Evaluation-I (MICHE-I). Images in the CASIAv3-Interval database are pictured under near-infrared (NIR) environments, which is affected by occlusions due to the use of the lens. Images in the UBIRISv1 and MICHE-I databases are collected under visible wavelength (VW) and uncooperative scenario. The VW images are noisier than the NIR images. Therefore, the segmentation/recognition accuracy of the CASIAv3-Interval and MMU1 is higher than the UBIRISv1 and MICHE-I database.

Table 2 details of databases

In the presented method, segmentation / localization is implemented in two stages. The proposed IDS algorithm based MRFCM method (IDS-MRFCM) is employed prior to the segmentation of all the images in the databases (see Fig. 4b). This step isolates the iris region from the unwanted portions of the image. The resultant images are then segmented using GACs driven by a modified termination criterion (see Fig. 4c–d). The Segmentation performance on some sample images of MMU1, UBIRISv1, and CASIAv3-interval databases have been demonstrated in Figs. 5, 6 and 7, respectively. Figure 5 illustrates the segmentation using the IDS-MRFCM with four cluster centers. Figure 5a is the input image from the MMU1 database, Fig. 5b is the segmented image using the proposed method and Fig. 5c illustrates the final mask of the iris. The segmentation results are compared with the recent and well existing methods [1, 18, 20, 40, 44, 45], and are illustrated in Table 3. It has been observed from the obtained results, presented in Table 3, that the proposed method yields good segmentation accuracy compared with the existing techniques.

Fig. 4
figure 4

The segmentation of a sample image using the proposed method. a Original image, b pre-segmented image using the proposed IDS-MRFCM, c the stopping criterion using Eq. (4), d segmentation using GACs, e the final mask of the segmented iris

Fig. 5
figure 5

Segmentation of iris images from MMU1 database. a Input images, b segmented output by using the proposed method, c final mask of the segmentation

Fig. 6
figure 6

Segmentation of iris images from UBIRISv1 database. a Input images, b segmented output by using the proposed method, c final mask of the segmentation

Fig. 7
figure 7

Segmentation of iris images from CASIAv3-Interval database. a Input images, b segmented output by using the proposed method, c final mask of the segmentation

Table 3 Segmentation accuracy (%)

The segmentation performance of the proposed technique has also been tested on the MICHE-I database. The average image quality of this database is far lower. The images from the MICHE-I database are acquired from different mobile devices like iPhone5 (IP5), Galaxy Samsung IV (GS4), and Galaxy Tablet II (GT2). From each database 480 images (60subjects, 8samples each), which consists of images captured from front and back cameras, indoor and outdoor acquisitions, are taken for the experimentation of the method proposed. Figure 8 demonstrates the segmentation of sample images from MICHE-I dataset. The segmentation accuracy of the method proposed on MICHE-I database has been reported in the Table 4. It is noteworthy that the proposed technique is remarkably effective and yields satisfactory results on MICHE-I database.

Fig. 8
figure 8

Segmentation of iris images from MICHE-I database

Table 4 Segmentation accuracy (%) for MICHE database

The effectiveness of the segmentation method proposed is also tested for the identification/recognition of the system by conducting the post-segmentation process i.e., normalization, feature extraction, and iris code matching. Post-segmentation processing has been carried out using the standard techniques described in [1]. The mean values of hamming distance (HD) distributions for genuine and imposter comparisons have been illustrated in Table 5. The mean of genuine HD distribution against 5115 comparisons from CASIAv3-Interval database is 0.2472, it is 0.2587 against 5580 comparisons from the UBIRISv1 database, and it is 0.2563 against 1350 comparisons of MMU1 database and is 0.2468 against 1500 comparisons from IITDv1 database. Similarly, the mean of imposter HD distribution against 438,705 comparisons from the CASIAv3-Interval database is 0.4719 and it is 0.4695 against 567,105 comparisons from UBIRISv1 database. It is 0.4825 against 31,050 comparisons from the MMU1 dataset, and is 0.4820 against 74,250 comparisons for the IITDv1 database. It has been observed that the proposed method yields low HD for genuine comparisons and high HD for imposter comparisons, which is required.

Table 5 Mean of hamming distance (HD) distributions

Figure 9, shows the segmentation of some sample images from IITDv1 database. Figure 10, illustrates some sample iris images from MICHE-I database that were not properly segmented. As a result the calculated hamming distance between intra-class samples will be very high, which leads to a wrong rejection.

Fig. 9
figure 9

Segmentation of iris images from IITDv1 database. a Input images, b segmented output by using the proposed method, c final mask of the segmentation

Fig. 10
figure 10

Some sample images that are wrongly identified. a Input image from MICHE-I database, b segmented images, c corresponding masks of the segmented images

5 Conclusions

The segmentation/localization is a vital stage in any biometric authentication system for better recognition. The noise artifacts added during the capturing of the images under various lighting conditions will lead to improper segmentation. In order to delimit the iris from the other parts of the eye image, a novel morphological reconstructed FCM algorithm based on an improved differential search optimization algorithm has been proposed as a pre-processing step in the iris authentication pipeline. Many segmentation methods relax the assumption that the iris is a non-circle. In this paper, geodesic active contours are employed to segment the non-circular iris boundaries. The obtained results on the CASIAv3-Interval, UBIRISv1, MMU1, IITDv1, and MICHE-I datasets indicate the accuracy of the proposed method. The proposed method achieves high segmentation accuracy when compared with the existing methods. The proposed method can be further extended by incorporating deep learning methods to improve the segmentation accuracy of images with heavily occluded by lightning conditions. Many researchers now a day are implementing deep learning methods in both segmentation and feature extraction stages to improve recognition accuracy in mobile iris recognition applications.